siliconman01 Posted January 4, 2014 Share Posted January 4, 2014 How's this for wmdb? [Windows Media Player (Databases)*] LangSecRef=3023 Detect1=HKCR\Windows.Movie.Maker Detect2=HKCU\Software\Microsoft\MediaPlayer Default=False Warning=This will remove ratings, play counts, last played, etc. FileKey1=%SystemDrive%\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Media Player|*.*|REMOVESELF FileKey2=%SystemDrive%\Documents and Settings\NetworkService\Local Settings\Microsoft\Media Player|*.*|REMOVESELF FileKey3=%WinDir%\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Media Player|*.*|RECURSE FileKey4=%LocalAppData%\Microsoft\Media Player|*.wmdb;wmdbexport.xml FileKey5=%WinDir%\system32\config\systemprofile\Local Settings\Application Data\Microsoft\Media Player|*.wmdb FileKey6=%SystemDrive%\Documents and Settings\Default User\Local Settings\Application Data\Microsoft\Media Player|*.wmdb FileKey7=%SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Media Player|*.wmdb ExcludeKey1=%LocalAppData%\Microsoft\Media Player|CurrentDatabase*.wmdb ExcludeKey2=%SystemDrive%\Documents and Settings\*\Local Settings\Microsoft\Media Player|CurrentDatabase*.wmdb I'm not experiencing any problems with the code above and Windows Media Player 12 on Windows 8.1 x64 Professional. Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 8940 PC and Dell XPS 16 9640 Laptop. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
dvdbane Posted January 4, 2014 Share Posted January 4, 2014 How's this for wmdb? [Windows Media Player (Databases)*] LangSecRef=3023 Detect1=HKCR\Windows.Movie.Maker Detect2=HKCU\Software\Microsoft\MediaPlayer Default=False Warning=This will remove ratings, play counts, last played, etc. FileKey1=%SystemDrive%\Documents and Settings\NetworkService\Local Settings\Application Data\Microsoft\Media Player|*.*|REMOVESELF FileKey2=%SystemDrive%\Documents and Settings\NetworkService\Local Settings\Microsoft\Media Player|*.*|REMOVESELF FileKey3=%WinDir%\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Media Player|*.*|RECURSE FileKey4=%LocalAppData%\Microsoft\Media Player|*.wmdb;wmdbexport.xml FileKey5=%WinDir%\system32\config\systemprofile\Local Settings\Application Data\Microsoft\Media Player|*.wmdb FileKey6=%SystemDrive%\Documents and Settings\Default User\Local Settings\Application Data\Microsoft\Media Player|*.wmdb FileKey7=%SystemDrive%\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Media Player|*.wmdb ExcludeKey1=%LocalAppData%\Microsoft\Media Player|CurrentDatabase*.wmdb ExcludeKey2=%SystemDrive%\Documents and Settings\*\Local Settings\Microsoft\Media Player|CurrentDatabase*.wmdb for me, exclude key doesn't work did some test delete wmdb file except currentdatabase file = nothing happen delete currentdatabase only = other wmdb file seem useless and will be replace with new one when wmplayer closed delete currentdatabase = reset play count,last played etc Link to comment Share on other sites More sharing options...
Winapp2.ini Posted January 5, 2014 Author Share Posted January 5, 2014 I'll revert the entry in the next update until a solution is reached winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
FreeRyde Posted January 5, 2014 Share Posted January 5, 2014 New entries: [Aegisub*] LangSecRef=3023 Detect=HKLM\SOFTWARE\Aegisub Default=False FileKey1=%AppData%\Aegisub|mru.json FileKey2=%AppData%\Aegisub\log|*.*|REMOVESELF FileKey3=%AppData%\Aegisub\recovered|*.*|REMOVESELF FileKey4=%LocalAppData%\Aegisub\ffms2cache|*.*|REMOVESELF FileKey5=%ProgramFiles%\Aegisub|*.txt [Aegisub (Autosaves)*] LangSecRef=3023 Detect=HKLM\SOFTWARE\Aegisub Default=False Warning=Aegisub automatically saves a copy of each script you are working on. This will delete them. FileKey1=%AppData%\Aegisub\autosave|*.*|REMOVESELF [Aegisub (Auto Backups)*] LangSecRef=3023 Detect=HKLM\SOFTWARE\Aegisub Default=False Warning=Aegisub automatically saves a backup copy of each script you open. This will delete them. FileKey1=%AppData%\Aegisub\autoback|*.*|REMOVESELF [DVD-Cloner*] LangSecRef=3023 Detect1=HKCU\Software\Dvd-cloner Detect2=HKCU\Software\DVD-Cloner Gold Detect3=HKCU\Software\iPod-Cloner Default=False FileKey1=%AppData%\DVD-Cloner*|*.log FileKey2=%CommonAppData%\DVD-Cloner*|*.log FileKey3=%Documents%|Smart.log;Smart_result.log FileKey4=%ProgramFiles%\DVD-Cloner*|*.log|RECURSE FileKey5=%ProgramFiles%\DVD-Cloner Platinum\*\readcache|*.* FileKey6=%SystemDrive%|dtdlog.txt FileKey7=%WinDir%\system32|dvdtest10024.dat [WinToUSB*] LangSecRef=3024 Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WinToUSB_is1 Default=False FileKey1=%ProgramFiles%\WinToUSB\bin|*.log Link to comment Share on other sites More sharing options...
Winapp2.ini Posted January 5, 2014 Author Share Posted January 5, 2014 Interim updates resume tonight! I'll update either late tonight (est) or sometime tomorrow afternoon. It's going to be a pretty sizable update too. Seems like a good way to ring in the new year winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
SMalik Posted January 6, 2014 Share Posted January 6, 2014 I don't have Adblock and FlashGot Firefox extensions on my system, but they still show up in CCleaner. Is it possible that we can change the Firefox extensions "Detect" path to some other? Link to comment Share on other sites More sharing options...
Moderators Andavari Posted January 6, 2014 Moderators Share Posted January 6, 2014 Using Firefox Portable (don't have the install version), Adblock Plus could be detected two ways: * %SystemDrive%\PortableApps\FirefoxPortable\Data\profile\adblockplus * %SystemDrive%\PortableApps\FirefoxPortable\Data\profile\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi Link to comment Share on other sites More sharing options...
FreeRyde Posted January 6, 2014 Share Posted January 6, 2014 New entries: [Blue-Cloner*] LangSecRef=3023 Detect=HKCU\Software\Blue-cloner Default=False FileKey1=%AppData%\Blue-Cloner|*.log FileKey2=%AppData%\Blue-Cloner\ReadCache|*.*|REMOVESELF FileKey3=%ProgramFiles%\Blue-Cloner|*.log;*.txt [iPod-Cloner*] LangSecRef=3023 Detect=HKCU\Software\iPod-Cloner Default=False FileKey1=%ProgramFiles%\iPod-Cloner|*.log FileKey2=%ProgramFiles%\iPod-Cloner\ReadCache|*.* FileKey3=%SystemDrive%|dtdlog.txt [MusicBee*] LangSecRef=3023 Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MusicBee Default=False FileKey1=%AppData%\MusicBee|*.dat FileKey2=%AppData%\MusicBee\InternalCache|*.*|REMOVESELF [Open Blu-ray Ripper*] LangSecRef=3023 Detect=HKCU\Software\OpenCloner\BDRipper Default=False FileKey1=%AppData%\Open Blu-ray Ripper|OBR_LOG_FILE.txt FileKey2=%AppData%\Open Blu-ray Ripper\ReadCache|*.*|REMOVESELF [Open Blu-ray to DVD*] LangSecRef=3023 Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Blu-ray to DVD Pro_is1 Default=False FileKey1=%ProgramFiles%\Blu-ray to DVD*|*.log;*.txt FileKey2=%ProgramFiles%\Blu-ray to DVD*\ReadCache|*.* [Open DVD Ripper*] LangSecRef=3023 Detect=HKCU\Software\OpenCloner\DVDRipper Default=False FileKey1=%AppData%\Open DVD Ripper|ODR_LOG_FILE.txt FileKey2=%AppData%\Open DVD Ripper\ReadCache|*.*|REMOVESELF [Trojan Remover*] LangSecRef=3024 Detect=HKLM\SOFTWARE\Simply Super Software\Trojan Remover Default=False FileKey1=%CommonAppData%\Logs|*.*|REMOVESELF FileKey2=%Documents%\Simply Super Software|*.*|REMOVESELF Modified: [dvdcss*] LangSecRef=3023 DetectFile=%AppData%\dvdcss Default=False FileKey1=%AppData%\dvdcss|*.*|REMOVESELF FileKey2=%UserProfile%\.dvdcss|*.*|REMOVESELF - Edited FileKey1 and 2 to REMOVESELF from RECURSE. Folder regenerates when utilized. [Stream-Cloner*] LangSecRef=3023 Detect=HKCU\Software\Stream-Cloner Default=False FileKey1=%AppData%\Stream-Cloner|*.log;IeRecentVisit.txt FileKey2=%AppData%\Stream-Cloner\Cap_images|*.*|REMOVESELF FileKey3=%AppData%\Stream-Cloner\thumbs|*.*|REMOVESELF - Improved FileKey1 - Added FileKey2 and 3 Link to comment Share on other sites More sharing options...
SMalik Posted January 6, 2014 Share Posted January 6, 2014 Using Firefox Portable (don't have the install version), Adblock Plus could be detected two ways: * %SystemDrive%\PortableApps\FirefoxPortable\Data\profile\adblockplus * %SystemDrive%\PortableApps\FirefoxPortable\Data\profile\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi When I use the original Firefox profile path (rs3s1h3p.default), CCleaner detects the entry. However, when I use an Asterisk (*) instead of the profile path, CCleaner does not detect the entry. May be you guys can help. [Adblock Backups*] LangSecRef=3026 DetectFile=%AppData%\Mozilla\Firefox\Profiles\rs3s1h3p.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi Default=False FileKey1=%AppData%\Mozilla\Firefox\Profiles\*\adblock*|patterns-backup*.ini [FlashGot*] LangSecRef=3026 DetectFile=%AppData%\Mozilla\Firefox\Profiles\rs3s1h3p.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi Default=False FileKey1=%AppData%\Mozilla\Firefox\Profiles\*|FlashGot.log;FlashGot.log.bak* Link to comment Share on other sites More sharing options...
Moderators Andavari Posted January 6, 2014 Moderators Share Posted January 6, 2014 DetectFile=%AppData%\Mozilla\Firefox\Profiles\rs3s1h3p.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi DetectFile=%AppData%\Mozilla\Firefox\Profiles\rs3s1h3p.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi I don't know if this will work (replaces the profile name with an asterick): DetectFile=%AppData%\Mozilla\Firefox\Profiles\*.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi DetectFile=%AppData%\Mozilla\Firefox\Profiles\*.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi ---------------------------------- Off topic: Too bad CCleaner can't do something like detect a file/folder using recurse (just a wishlist thing I suppose): DetectFileRecurse=%AppData%\Mozilla\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi DetectFileRecurse=%AppData%\Mozilla\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi Link to comment Share on other sites More sharing options...
Winapp2.ini Posted January 6, 2014 Author Share Posted January 6, 2014 updated HTML change log will come tomorrow, for now just use changes.txt winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
siliconman01 Posted January 6, 2014 Share Posted January 6, 2014 Update does not appear to be posted. Download is previous release "Link to download Winapp2.ini Version: v4.09.131219" Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 8940 PC and Dell XPS 16 9640 Laptop. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
FreeRyde Posted January 6, 2014 Share Posted January 6, 2014 Got 'em fine here... Thanks for the update Winapp2.ini! Link to comment Share on other sites More sharing options...
siliconman01 Posted January 6, 2014 Share Posted January 6, 2014 Got it now....thanks much. Windows 10 x64 Pro on ASUS Maximus VIII Extreme motherboard, i7-6700k CPU,H220 X2 Liquid Cooler, 64 gbyte RipJaws DDR4 3200 RAM, Samsung 970 Pro NVMe M.2 500 gbyte SSD + Samsung 850 Pro 512 gbyte SSD, EVGA RTX 3060 Titan graphics card (Home Built System); Windows 11x64 Pro on 512 gigabyte Dell XPS 8940 PC and Dell XPS 16 9640 Laptop. ASUS RT-AC88U router, 14 tbyte WD My Cloud PR2100 NAS Server, 200 Mbps cable Internet, MS Edge Chromium, MS Office 2021 (Local), Casper 11, DisplayFusion (3 Flat Panel Displays per system): Latest Bitdefender Internet Security, Quicken, Weather Watcher Live, ThumbsPlus 10, Sticky Password 8, WD Smartware, CyberLink PowerDVD23, MSI AfterBurner, Rainmeter, 8GadgetPack, and many more. Link to comment Share on other sites More sharing options...
SMalik Posted January 6, 2014 Share Posted January 6, 2014 Thanks for the update. Link to comment Share on other sites More sharing options...
SMalik Posted January 6, 2014 Share Posted January 6, 2014 I don't know if this will work (replaces the profile name with an asterick): DetectFile=%AppData%\Mozilla\Firefox\Profiles\*.default\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi DetectFile=%AppData%\Mozilla\Firefox\Profiles\*.default\extensions\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi ---------------------------------- Off topic: Too bad CCleaner can't do something like detect a file/folder using recurse (just a wishlist thing I suppose): DetectFileRecurse=%AppData%\Mozilla\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi DetectFileRecurse=%AppData%\Mozilla\{19503e42-ca3c-4c27-b1e2-9cdb2170ee34}.xpi I tried lots of different ways, but none of them worked. Link to comment Share on other sites More sharing options...
back_track Posted January 6, 2014 Share Posted January 6, 2014 THX for the update From the last winapp2.ini [XnView MP*] LangSecRef=3024 Detect=HKCU\Software\XnView\XnViewMP Default=False FileKey1=%AppData%\XnViewMP|*.db;category.bak FileKey2=%ProgramFiles%\XnViewMP|category.bak;*.db [XnView*] LangSecRef=3023 Detect=HKCU\Software\XnView Default=False FileKey1=%AppData%\XnView|XnView.db;category.bak FileKey2=%AppData%\XnView\cache|*.db FileKey3=%ProgramFiles%\XnView|category.bak FileKey4=%ProgramFiles%\XnView\cache|*.db I would say they have the same LangSecRef=3023 .... ---> [XnView MP*]LangSecRef=3023Detect=HKCU\Software\XnView\XnViewMPDefault=FalseFileKey1=%AppData%\XnViewMP|*.db;category.bakFileKey2=%ProgramFiles%\XnViewMP|category.bak;*.db Link to comment Share on other sites More sharing options...
FreeRyde Posted January 6, 2014 Share Posted January 6, 2014 Modified: [AnyDVD*] LangSecRef=3023 Detect=HKCU\Software\SlySoft\AnyDVD Default=False FileKey1=%Documents%\AnyDVD_logs|*.*|REMOVESELF - Renamed to AnyDVD. Detect line detects AnyDVD classic and AnyDVDHD - Changed LangSecRef to 3023 to group with other decryption, disc ripper software. [DVD-Cloner*] LangSecRef=3023 Detect1=HKCU\Software\Dvd-cloner Detect2=HKCU\Software\DVD-Cloner Gold Detect3=HKCU\Software\iPod-Cloner Default=False FileKey1=%AppData%\DVD-Cloner*|*.log FileKey2=%CommonAppData%\DVD-Cloner*|*.log FileKey3=%Documents%|Smart.log;Smart_result.log FileKey4=%ProgramFiles%\DVD-Cloner*|*.log|RECURSE FileKey5=%ProgramFiles%\DVD-Cloner Platinum\*\readcache|*.* FileKey6=%SystemDrive%|dtdlog.txt FileKey7=%WinDir%\system32|dvdtest10024.dat - Added FileKey5 [Listary*] LangSecRef=3024 Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Listary_is1 Default=False FileKey1=%AppData%\Listary\CrashRpt|*.*|REMOVESELF FileKey2=%ProgramFiles%\Listary|*.log - Corrected FileKey2 directory Link to comment Share on other sites More sharing options...
Winapp2.ini Posted January 6, 2014 Author Share Posted January 6, 2014 Sorry, forgot to change the version number in the post. The link went to the right place though I've been playing with the firefox thing myself and haven't had any success either. Kind of a bummer. winapp2.ini additions thread winapp2.ini github Link to comment Share on other sites More sharing options...
Coffee4Joe Posted January 7, 2014 Share Posted January 7, 2014 (edited) Revised Entry Corrected the FileKey12 [Windows Communications Apps*] LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe DetectFile=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe Default=False FileKey1=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetCache|*.*|RECURSE FileKey3=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetCookies|*.*|RECURSE FileKey4=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetHistory|*.*|RECURSE FileKey5=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE FileKey6=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\Content|*.* FileKey7=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.* FileKey8=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE FileKey9=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\PRICache|*.* FileKey10=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Temp|*.* FileKey11=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\TempState|*.*|RECURSE FileKey12=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState\LiveComm\*\*\DBStore\LogFiles|*.log RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\SearchHistory FileKey12 like that makes mail accounts forget settings like when it retrives mail & what it shows notifacations for, also passwords. edit: the files in there don't go above 512kb & are recreated anyways Edited January 7, 2014 by Coffee4Joe Link to comment Share on other sites More sharing options...
SMalik Posted January 7, 2014 Share Posted January 7, 2014 FileKey12 like that makes mail accounts forget settings like when it retrives mail & what it shows notifacations for, also passwords. edit: the files in there don't go above 512kb & are recreated anyways I just corrected the paths because "nouser0000000000000001\120712-0049" was not a valid path. Please look at the posts listed below. http://forum.piriform.com/index.php?showtopic=32310&page=176&do=findComment&comment=241756 http://forum.piriform.com/index.php?showtopic=32310&page=185&do=findComment&comment=243364 Link to comment Share on other sites More sharing options...
back_track Posted January 7, 2014 Share Posted January 7, 2014 New: [ANNO 2070 Logs*] Section=Games DetectFile=%AppData%\Ubisoft\ANNO 2070\ Default=False FileKey1=%AppData%\Ubisoft\ANNO 2070\Logs|*.log;*.dmp FileKey2=%AppData%\Ubisoft\ANNO 2070\Logs\netlogs|*.log [ANNO 2070 Cache*] Section=Games DetectFile=%AppData%\Ubisoft\ANNO 2070\ Default=False FileKey1=%AppData%\Ubisoft\ANNO 2070\Cache|*.*|REMOVESELF Link to comment Share on other sites More sharing options...
Coffee4Joe Posted January 7, 2014 Share Posted January 7, 2014 I just corrected the paths because "nouser0000000000000001\120712-0049" was not a valid path. How about this for FileKey12? Removing any other .log files in there seem to cause settings to be lost for me. My mail app must of been still open in task manager when I tested and posted http://forum.piriform.com/index.php?showtopic=32310&page=185&do=findComment&comment=243364 at that time it was just passwords being cleared [Windows Communications Apps*] LangSecRef=3031 Detect=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe DetectFile=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_8wekyb3d8bbwe Default=False FileKey1=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\AppCache|*.*|RECURSE FileKey2=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetCache|*.*|RECURSE FileKey3=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetCookies|*.*|RECURSE FileKey4=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\INetHistory|*.*|RECURSE FileKey5=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CLR_v4.0\UsageLogs|*.*|RECURSE FileKey6=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\Content|*.* FileKey7=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\CryptnetUrlCache\MetaData|*.* FileKey8=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Microsoft\Internet Explorer\DOMStore|*.*|RECURSE FileKey9=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\PRICache|*.* FileKey10=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\AC\Temp|*.* FileKey11=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\TempState|*.*|RECURSE FileKey12=%LocalAppData%\Packages\microsoft.windowscommunicationsapps_*\LocalState\LiveComm\*\*\DBStore\LogFiles|edbtmp.log RegKey1=HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\microsoft.windowscommunicationsapps_8wekyb3d8bbwe\SearchHistory Link to comment Share on other sites More sharing options...
FreeRyde Posted January 8, 2014 Share Posted January 8, 2014 New entries: [Anvisoft Cloud System Booster*] LangSecRef=3024 Detect=HKLM\SOFTWARE\Anvisoft\Cloud System Booster Default=False FileKey1=%LocalAppData%\Anvisoft\Anvi Slim Toolbar\FFToobar\tmp|*.*|REMOVESELF FileKey2=%ProgramFiles%\Anvisoft\Cloud System Booster|*.log;*.txt FileKey3=%ProgramFiles%\Anvisoft\Cloud System Booster\logs|*.* FileKey4=%ProgramFiles%\Anvisoft\Cloud System Booster\reports|*.* FileKey5=%ProgramFiles%\Anvisoft\Cloud System Booster\VLog|*.* [Anvisoft Cloud System Booster (Backups)*] LangSecRef=3024 Detect=HKLM\SOFTWARE\Anvisoft\Cloud System Booster Default=False Warning=This will delete your backups. You will be unable to undo any changes made with Cloud System Booster. FileKey1=%LocalAppData%\Anvisoft\Anvi Slim Toolbar\IEToobar|*.*|REMOVESELF FileKey2=%LocalAppData%\Anvisoft\Anvi Slim Toolbar\FFToobar|*.*|REMOVESELF FileKey3=%ProgramFiles%\Anvisoft\Cloud System Booster\bak|*.* [BB FlashBack 4*] LangSecRef=3023 Detect1=HKLM\SOFTWARE\Blueberry Software\BB FlashBack Express Detect2=HKLM\SOFTWARE\Blueberry Software\BB FlashBack Pro 4 Detect3=HKLM\SOFTWARE\Blueberry Software\BB FlashBack Standard 4 Default=False FileKey1=%AppData%\Blueberry|ExportToAVIStat.txt;ExportToQTStat.txt;ExportToSWFStat.txt;ExportToWMVStat.txt;FBExpress2 CrashTracking.xml;FlashBack4 CrashTracking.xml;FBStandard4 CrashTracking.xml;FBExpress2 UsageTracking.xml;FlashBack4 UsageTracking.xml;FBStandard4 UsageTracking.xml;RecorderStat.txt;RecorderStaticStat.txt FileKey2=%AppData%\LogSys|*.*|REMOVESELF FileKey3=%CommonProgramFiles%\Blueberry Software|*.log FileKey4=%ProgramFiles%\Blueberry Software\*|drvinstlog.txt;*.log FileKey5=%WinDir%\system32\MTSLog|*.*|REMOVESELF [Blumentals Easy GIF Animator*] LangSecRef=3023 Detect=HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Easy GIF Animator_is1 Default=False FileKey1=%ProgramFiles%\Easy GIF Animator|*.txt|RECURSE Link to comment Share on other sites More sharing options...
SMalik Posted January 9, 2014 Share Posted January 9, 2014 The [AVG AntiVirus Installer*] should be removed. The FileKey1 is alreday in [AVG AntiVirus 2013 More*] and [AVG AntiVirus 2014*]. I also suggest changing the names to [AVG 2013 More*] and [AVG 2014*]. [AVG AntiVirus Installer*]LangSecRef=3024Detect=HKLM\SOFTWARE\AVGDefault=FalseFileKey1=%CommonAppData%\AVG*\SetupBackup|*.* ========================================= [AVG AntiVirus 2013 More*]LangSecRef=3024Detect=HKLM\SOFTWARE\AVG\AVG2013Default=FalseFileKey1=%CommonAppData%\AVG2013\IDS\config|*List.zip.bakFileKey2=%CommonAppData%\AVG2013\IDS\profile|globalLoadable.bakFileKey3=%CommonAppData%\AVG2013\Log|history.xmlFileKey4=%CommonAppData%\AVG2013\SetupBackup|*.*FileKey5=%CommonAppData%\MFAData\Logs|*.*FileKey6=%LocalAppData%\AVG2013\log|*.log;*.log.*FileKey7=%LocalAppData%\AVG2013\temp|*.tmpFileKey8=%ProgramFiles%\AVG\AVG2013|updatecomps.bak;*.oldFileKey9=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2013\dumps|*.*FileKey10=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2013\log|*.*FileKey11=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2013\dumps|*.*FileKey12=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2013\log|*.*[AVG AntiVirus 2014*]ID=2313LangSecRef=3024Detect=HKLM\SOFTWARE\AVG\AVG2014Default=FalseFileKey1=%CommonAppData%\AVG2014\Log|*.log;history.xmlFileKey2=%CommonAppData%\AVG2014\scanlogs|*.logFileKey3=%CommonAppData%\AVG2014\update\backup|*.*FileKey4=%CommonAppData%\AVG2014\Emc\Log|*.logFileKey5=%CommonAppData%\AVG2014\IDS\config|*List.zip.bakFileKey6=%CommonAppData%\AVG2014\IDS\profile|globalLoadable.bakFileKey7=%CommonAppData%\AVG2014\Temp|*.tmpFileKey8=%CommonAppData%\AVG2014\SetupBackup|*.*FileKey9=%CommonAppData%\MFAData\Logs|*.*FileKey10=%LocalAppData%\AVG2014\log|*.log;*.log.*FileKey11=%LocalAppData%\AVG2014\temp|*.tmpFileKey12=%ProgramFiles%\AVG\AVG2014|updatecomps.bak;*.oldFileKey13=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2014\dumps|*.*FileKey14=%WinDir%\System32\config\systemprofile\AppData\Local\Avg2014\log|*.*FileKey15=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2014\dumps|*.*FileKey16=%WinDir%\SysWOW64\config\systemprofile\AppData\Local\Avg2014\log|*.* Link to comment Share on other sites More sharing options...
Recommended Posts